Shamal Faily
A model of security culture for e-science.
Faily, Shamal; Fl�chais, Ivan
Authors
Ivan Fl�chais
Contributors
Nathan L. Clarke
Editor
Steven Furnell
Editor
Rossouw Von Solms
Editor
Abstract
There is a need to understand the cultural issues affecting security in large, distributed and heterogeneous systems; such systems are typified by e-Science projects. We present a model of security culture for e-Science, grounded both in the security literature and in empirical data from an e-Science project. From this model, we present five concepts, which have differing effects on security culture. Each concept is discussed in terms of how the literature treats it, and how it impacts security culture in practice. This discussion highlights differences and similarities between the two domains.
Citation
FAILY, S. and FLÉCHAIS, I. 2011. A model of security culture for e-science. In Clarke, N., Furnell, S. and Von Solms, R. (eds.) Proceedings of the South African information security multi-conference (SAISMC 2010), 17-18 May 2010, Port Elizabeth, South Africa. Plymouth: University of Plymouth, pages 154-164.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | South African information security multi-conference (SAISMC 2010) |
Start Date | May 17, 2010 |
End Date | May 18, 2010 |
Acceptance Date | May 17, 2010 |
Publication Date | Feb 7, 2011 |
Deposit Date | Dec 1, 2021 |
Publicly Available Date | Dec 1, 2021 |
Publisher | University of Plymouth |
Peer Reviewed | Peer Reviewed |
Pages | 154-164 |
ISBN | 9781841022567 |
Keywords | Security culture; e-Science; Software engineering |
Public URL | https://rgu-repository.worktribe.com/output/1427826 |
Publisher URL | https://www.cscan.org/?page=openaccess&eid=12&id=183 |
Files
FAILY 2011 A model of security culture for e-science
(504 Kb)
PDF
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article